Intelligence & Analytics November 8, 2017 Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts 2 min read - As the cybercrime landscape expands, SOC teams need endpoint security tools that can reduce the time it takes to gain actionable threat intelligence.
Endpoint October 9, 2017 Five Key Differences Between Personal and Enterprise Endpoint Security 3 min read - CISOs must understand the key difference between individual and enterprise endpoint security to adequately protect corporate data.
Endpoint September 25, 2017 Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks 2 min read - Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
Data Protection September 5, 2017 The Time for IT Asset Management Is Now 3 min read - Due to the rapidly shifting technology landscape, a robust, dynamic and well-funded IT asset management program is a prerequisite to success in business.
August 17, 2017 RDP Risk Leaves Enterprises Exposed to Attackers 2 min read - Millions of ports are being left open online, and many of these are being exposed to potential attackers through the remote desktop protocol (RDP).
Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
Endpoint May 19, 2017 Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security 3 min read - Security professionals can now add the previously unapplied knowledge from IBM BigFix to the existing set of data available through QRadar.
Endpoint May 18, 2017 How Basic Endpoint Patching Helps Protect Against Ransomware and Other Attacks 5 min read - Effective defense against large-scale ransomware attacks such as WannaCry starts with basic endpoint protection and patch management.
Endpoint May 11, 2017 The Road to 2020, Part II: Transforming Your Enterprise With IoT 5 min read - To protect sensitive data from emerging threats associated with the rise of the IoT, security analysts must adopt a centralized approach to UEM.
Data Protection May 10, 2017 Compliance Does Not Always Cure Health Care Security Woes 2 min read - Compliance should be viewed as a framework to facilitate security, not a magic wand to make threats and vulnerabilities disappear.